Értékelés:
Kiadva: 08.05.2004.
Nyelv : Angol
Szint: Középiskola
Irodalom:
Referenciák: Nincs használatban
  • Esszék 'Explain the Main Developments in E-Commerce Security', 1.
  • Esszék 'Explain the Main Developments in E-Commerce Security', 2.
  • Esszék 'Explain the Main Developments in E-Commerce Security', 3.
KivonatZsugorodni

For this scenario, timing attacks could also be used by Eve on the AES encryption, along with Power Analysis. Power Analysis involves observing the power consumption of the device at any point during the cryptographic process as power consumption can be seen to be related to the instruction being executed and data being process (e.g. multiplication uses more power than addition, etc). Timing analysis is also relevant for symmetric ciphers as well as public key algorithms. In this case, information about the key or plaintext could be obtained by observing how long it takes the given implantation to perform decryptions on various cipher texts. This exploits
There is also a weakness in using the Electronic Code Book mode of operation. Electronic Code Book is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding cipher text value and vice versa. The same plaintext value will always result in the same cipher text value. …

Küldés e-mailben

Az Ön neve:

Adja meg az e-mail-címet, amelyen meg szeretné kapni a linket:

Üdv!
{Your name} szerint érdemes lehet megtekinteni ezt a dokumentumot az eKönyvtárban „Explain the Main Developments in E-Commerce Security”.

A dokumentumra mutató link:
https://www.ekonyvtar.eu/w/874659

Küldés

E-mail elküldve